Blog

Small to mid-size firms are sometimes at a disadvantage when litigating against larger firms or competing for litigation engagements. The disadvantage isn’t the capabilities of the attorneys, but simply the access the larger firms have to expensive software and staff that process and manage discovery.

As IT consultants, that's a statement we hear fairly often. It is a statement you may never need to make again if you implement a Document Management System (DMS). With a DMS, you don’t need to know where you saved the document because the DMS takes care of knowing for you, significantly reducing the 'human error' factor that contributes to the "mysterious disappearance" of documents.

On June 21st, 1948, an English machine called Small Scale Experimental Machine (SSEM) successfully executed the first stored computer program. After the successful test, one pictures the scientists headed out to a pub to celebrate their success, securing their computer and its valuable program by simply locking the door.

You may not have heard of two-factor authentication (also referred to as multi-factor authentication), but there is a strong chance that you are already using it. In its most common use, two-factor authentication (2FA) is used as an added security step for password protected systems.

A managed proactive approach to updating and protecting your workstations

Patch Management

The most vulnerable computers on your network are those missing current software patches for Microsoft Windows, Microsoft Office, and essential 3rd party components such as Java, Adobe Flash, and Acrobat.